General

  • Target

    d2e1358df53c86e937cd0ebce904ce37_JaffaCakes118

  • Size

    783KB

  • Sample

    240907-1day4awenj

  • MD5

    d2e1358df53c86e937cd0ebce904ce37

  • SHA1

    382a37b7e90e3847ba896023eb52ffca478c46c8

  • SHA256

    08e552f54e65ed655a29c9e3b8bbb71157eeec1239abec564e69e715e9e2ac7a

  • SHA512

    2392dee145eee3babb0da5945a6cc21ed4ad9b8332f0dfd0842009970d695d109b321bdbdc51f2e8eccb0fbdb6290c9505fd5cbb43c8cd585dc233f8386ab44c

  • SSDEEP

    24576:UavzvJ9HV8sY5ocz8RDf/7HFpgZE91H5D5F:UabfHS8RxxD

Malware Config

Extracted

Family

lokibot

C2

http://etruht.ga/LL0/200g-xz/cat.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      d2e1358df53c86e937cd0ebce904ce37_JaffaCakes118

    • Size

      783KB

    • MD5

      d2e1358df53c86e937cd0ebce904ce37

    • SHA1

      382a37b7e90e3847ba896023eb52ffca478c46c8

    • SHA256

      08e552f54e65ed655a29c9e3b8bbb71157eeec1239abec564e69e715e9e2ac7a

    • SHA512

      2392dee145eee3babb0da5945a6cc21ed4ad9b8332f0dfd0842009970d695d109b321bdbdc51f2e8eccb0fbdb6290c9505fd5cbb43c8cd585dc233f8386ab44c

    • SSDEEP

      24576:UavzvJ9HV8sY5ocz8RDf/7HFpgZE91H5D5F:UabfHS8RxxD

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks